An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability

MA Bouke, A Abdullah - Expert Systems with Applications, 2023 - Elsevier
In this paper, we investigate the impact of pattern leakage during data preprocessing on the
reliability of Machine Learning (ML) based intrusion detection systems (IDS). Data leakage …

[HTML][HTML] Digital health dashboards for decision-making to enable rapid responses during public health crises: replicable and scalable methodology

TR Katapally, ST Ibrahim - JMIR Research Protocols, 2023 - researchprotocols.org
Background: The COVID-19 pandemic has reiterated the need for cohesive, collective, and
deliberate societal efforts to address inherent inefficiencies in our health systems and …

Detection of application-layer DDoS attacks using machine learning and genetic algorithms

DM Sharif, H Beitollahi - Computers & Security, 2023 - Elsevier
Abstract Application-layer Distributed Denial of Service (App-DDoS) attacks continue to be a
pervasive problem in cybersecurity, despite the availability of various defensive frameworks …

Model Design of Intrusion Detection System on Web Server Using Machine Learning Based

A Tedyyana, O Ghazali, O Purbo - Proceedings of the 11th International …, 2024 - eudl.eu
In the current era of information technology development, web server security has become a
primary concern in maintaining data integrity, confidentiality, and availability. With the …

[HTML][HTML] Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost

V Vajrobol, BB Gupta, A Gaurav, HM Chuang - International Journal of …, 2024 - Elsevier
In today's world, where digital threats are on the rise, one particularly concerning threat is
the Mirai botnet. This malware is designed to infect and command a collection of Internet of …

An Unsupervised Generative Adversarial Network System to Detect DDoS Attacks in SDN

DMB Lent, VGDS Ruffo, LF Carvalho, J Lloret… - IEEE …, 2024 - ieeexplore.ieee.org
Network management is a crucial task to maintain modern systems and applications
running. Some applications have become vital for society and are expected to have zero …

[PDF][PDF] 'Improved heuristic framework for cyber security system on DDoS attack

R Ahuja, M Gupta - J. Data Acquisition Process, 2023 - sjcjycl.cn
Nowadays, networks have adopted the always-connected concept and as time goes on,
technology makes gadgets smaller and cheaper. This revolution lays the foundations for the …

Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks

X Zhao, KW Fok, VLL Thing - arXiv preprint arXiv:2404.07464, 2024 - arxiv.org
Network intrusion detection systems (NIDS) play a pivotal role in safeguarding critical digital
infrastructures against cyber threats. Machine learning-based detection models applied in …

[PDF][PDF] Developing of Blockchain Method in Message Interchange Systems.

V Poberezhnyk, I Opirskyy - CPITS, 2023 - ceur-ws.org
This paper examines the main blockchain and decentralized application features, their
advantages and disadvantages for use in message interchange systems, and proposes a …

Adversarially robust and real-time DDoS detection and classification framework using AutoML

S Maurya, A Handa, N Kumar… - … Security Journal: A Global …, 2024 - Taylor & Francis
ABSTRACT Denial of Service (DoS) attacks target the availability part of the CIA triad
(Confidentiality, Availability, and Integrity). A special category of these attacks is the …